Threat Modeling is to identify potential threats which could harm your business. It can give you idea on how to build a solid security strategy against potential threats. In order to understand your application context, you must understand the individual elements that, together, create it. Defining the various elements of…

“Tens of millions of dollars were stolen from Bangladesh’s central bank via the Federal Reserve Bank of New York, transferred to accounts in the Philippines and then laundered through the Philippine casino system.” said Al Jazeera – YouTube Channel. How could this be? The video below should give you some…

Social Network has became a big part of our life, but we do not know how to stay secure while we are using social network. បណ្តាញសង្គមបានក្លាយជាផ្នែកមួយដ៏សំខាន់សម្រាប់ជីវិតរបស់យើង ប៉ុន្តែមានមនុស្សជាច្រើនមិនបានដឹងអំពីការរក្សាសុវត្ថិភាពរបស់ខ្លួនពេលលេងបណ្តាញសង្គមឡើយ។ Source/ប្រភព: IBM

Digital extortion is the act of coercing an individual or company to pay in exchange for gaining back access to stolen cyber assets. [KHMER Language]ការគំរាមកំហែងយកប្រាក់តាមប្រព័ន្ធឌីជីថលគឺជាការបង្ខិតបង្ខំបុគ្គល ឬក្រុមហ៊ុនណាមួយអោយបង់ប្រាក់ដើម្បីជាថ្នូរនឹងការចូលទៅយក ឬប្រើប្រាស់ឯកសារដែលបានលួច។

Social Network is a systematic website or tool which allows users to communicate each other by sharing information, messages, images, videos, comments, etc. It has became part of life of Internet’s users. Many people receives benefits from it while some don’t. Therefore, I would like to share some tips which…

FOUNDER

Victor C. Sovichea received his MSc. of Computing from RMIT University in Australia. He specialize in Cyber Security and Digital Forensics.

To me, building a good cyber space is not only about working with cyber technical people, but it’s also about sharing knowledge to the public to aware of the threats and risks from using modern technology.